Konica Minolta bizhub C654 bizhub C654/C754 Web Management Tool User Guide - Page 393

[IPsec Settings]

Page 393 highlights

17 Settings [Secondary DNS Server 1] or [Secondary DNS Server 2] Description When using multiple DNS servers, select a number to be registered, and enter the address of your secondary DNS server. [IPsec Settings] To display: [Utility] - [Administrator Settings] - [Network Settings] - [TCP/IP Settings] - [IPsec Settings] Configure settings to enable use of IPsec on this machine. The IPsec technology prevents the falsification or leakage of data on the IP packet basis by using encryption technology. As IPsec encrypts data in the network layer, secure communication is ensured even if you use protocols in an upper layer or applications that do not support encryption. Settings [IPsec Settings] [IKE Settings] [IPsec SA Settings] [Peer] [Protocol Setting] [Enable IPsec] [Communication Check] Description Specify parameters required for IPsec communication. You can configure IKE (Internet Key Exchange), SA (Security Association), IPsec peer, or IPsec protocol settings. Configure settings required to create a common key for IPsec. For details, refer to page 17-6. Configure SA (Security Association) required for encrypted communication. For details, refer to page 17-6. Register the peer of this machine to use IPsec. For details, refer to page 17-7. Specify a protocol used for IPsec communication. For details, refer to page 17-7. Configure settings to enable use of IPsec on this machine. Also, specify the policy for IPsec communication. For details, refer to page 17-8. Select this option to confirm IPsec communication error logs. For details, refer to page 17-8. [IKE Settings] To display: [Utility] - [Administrator Settings] - [Network Settings] - [TCP/IP Settings] - [IPsec Settings] - [IPsec Settings] - [IKE Settings] Configure settings required to create a common key for IPsec. Settings [IKEv1 Settings] or [IKEv2 Settings] [Encryption Algorithm] [Authentication Algorithm] [Diffie-Hellman Group] [Key Validity Period] [Negotiation Mode] Description Select [IKEv1 Settings] or [IKEv2 Settings] depending on your IKE version. Select the encryption algorithm to create a common key used for communication. Select the authentication algorithm to create a common key used for communication. Select the Diffie-Hellman group. [Group 2] is specified by default. Specify the validity period of a common key to securely create a common key used to encrypt communications. When this period has expired, a new key is created. This can secure the communication. [28800] is specified by default. Select the method to securely create a common key used to encrypt communications. This option is not available in [IKEv2 Settings]. [Main Mode] is specified by default. [IPsec SA Settings] To display: [Utility] - [Administrator Settings] - [Network Settings] - [TCP/IP Settings] - [IPsec Settings] - [IPsec Settings] - [IPsec SA Settings] - [Edit] bizhub C754/C654 17-6

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427

bizhub C754/C654
17-6
17
[IPsec Settings]
To display: [Utility] - [Administrator Settings] - [Network Settings] - [TCP/IP Settings] - [IPsec Settings]
Configure settings to enable use of IPsec on this machine.
The IPsec technology prevents the falsification or leakage of data on the IP packet basis by using encryption
technology. As IPsec encrypts data in the network layer, secure communication is ensured even if you use
protocols in an upper layer or applications that do not support encryption.
[IKE Settings]
To display: [Utility] - [Administrator Settings] - [Network Settings] - [TCP/IP Settings] - [IPsec Settings] - [IPsec
Settings] - [IKE Settings]
Configure settings required to create a common key for IPsec.
[IPsec SA Settings]
To display: [Utility] - [Administrator Settings] - [Network Settings] - [TCP/IP Settings] - [IPsec Settings] - [IPsec
Settings] - [IPsec SA Settings] - [Edit]
[Secondary DNS Server 1]
or [Secondary DNS Server
2]
When using multiple DNS servers, select a number to be registered, and
enter the address of your secondary DNS server.
Settings
Description
Settings
Description
[IPsec Settings]
Specify parameters required for IPsec communication.
You can configure IKE (Internet Key Exchange), SA (Security Association),
IPsec peer, or IPsec protocol settings.
[IKE Settings]
Configure settings required to create a common key for IPsec. For details,
refer to page 17-6.
[IPsec SA Settings]
Configure SA (Security Association) required for encrypted communica-
tion. For details, refer to page 17-6.
[Peer]
Register the peer of this machine to use IPsec. For details, refer to
page 17-7.
[Protocol Setting]
Specify a protocol used for IPsec communication. For details, refer to
page 17-7.
[Enable IPsec]
Configure settings to enable use of IPsec on this machine. Also, specify the
policy for IPsec communication. For details, refer to page 17-8.
[Communication Check]
Select this option to confirm IPsec communication error logs. For details,
refer to page 17-8.
Settings
Description
[IKEv1 Settings] or [IKEv2
Settings]
Select [IKEv1 Settings] or [IKEv2 Settings] depending on your IKE version.
[Encryption Algorithm]
Select the encryption algorithm to create a common key used for commu-
nication.
[Authentication Algo-
rithm]
Select the authentication algorithm to create a common key used for com-
munication.
[Diffie-Hellman Group]
Select the Diffie-Hellman group.
[Group 2] is specified by default.
[Key Validity Period]
Specify the validity period of a common key to securely create a common
key used to encrypt communications. When this period has expired, a new
key is created. This can secure the communication.
[28800] is specified by default.
[Negotiation Mode]
Select the method to securely create a common key used to encrypt com-
munications. This option is not available in [IKEv2 Settings].
[Main Mode] is specified by default.